cups 2.2.10-6+deb10u5 source package in Debian
Changelog
cups (2.2.10-6+deb10u5) buster; urgency=medium * Non-maintainer upload by the LTS Team. * CVE-2020-10001.patch An input validation issue might allow a malicious application to read restricted memory. -- Thorsten Alteholz <email address hidden> Wed, 23 Feb 2022 22:03:02 +0100
Upload details
- Uploaded by:
- Debian Printing Group
- Uploaded to:
- Buster
- Original maintainer:
- Debian Printing Group
- Architectures:
- any all
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cups_2.2.10-6+deb10u5.dsc | 3.4 KiB | 4a5ec6f5a9ae50a5ccb1873a9464af05f07a6422ec5e7f8d4f31368a17518914 |
cups_2.2.10.orig.tar.gz | 9.9 MiB | 77c8b2b3bb7fe8b5fbfffc307f2c817b2d7ec67b657f261a1dd1c61ab81205bb |
cups_2.2.10.orig.tar.gz.asc | 864 bytes | be235dd0cc526e5bde2a67f0dc2888be5d8dc40d1dfa44ab1a322d83f606e82d |
cups_2.2.10-6+deb10u5.debian.tar.xz | 353.2 KiB | ac50140b7135eeaf7fa61ccc2b8be15e9e140009f2e43dc50d241819cd9a21c3 |
No changes file available.